Internet of Things: A Perspective from Security and Privacy
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Ovidiu Vermesan SINTEF, Norway, Peter FriessEU, Belgium, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystemsâ€, Elesvier publishers’ series in communications, 2013.
Ovidiu Vermesan SINTEF, Norway, Peter FriessEU, Belgium, “Internet of Things–From Research and Innovation to Market Deploymentâ€, Elesvier publishers’ series in communications, 2014.
Karen Rose, Scott Eldridge, Lyman Chapin, “The Internet of Things: An Overview Understanding the Issues and Challenges of a More Connected Worldâ€, The Internet Society (ISOC), 2015.
Xu Cheng, Minghui Zhang, Fuquan Sun, â€Architecture of internet of things and its key technology integration based-on RFID,†in 5thInternational Symposium on ComputationalIntelligence and Design, pp. 294-297, 2012.
Jose L. Hernandez-Ramos, Jorge Bernal Bernabe and Antonio F. Skarmeta, “Managing Context Information for Adaptive Security in IoT environmentsâ€, 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, pp: 676-681.
Minela Grabovica, Drazen Pezer, Srdan Popic and Vladimir Knezevic, “Provided security measures of enabling technologies in Internet of Things (IoT): A surveyâ€, IEEE Conference 2016, pp: 28-31.
Mujahid Mohsin, Zahid Anwar, Ghaith Husariy, Ehab Al-Shaery and Mohammad Ashiqur Rahmanz, “IoTSAT: A Formal Framework for Security Analysis of the Internet of Things (IoT)â€, IEEE Conference on Communications and Network Security (CNS)2016 pp: 1-9.
Jarkko Kuusijarvi, Reijo Savola, Pekka Savolainen and Antti Evesti, “Mitigating loT Security Threats with a Trusted Network Elementâ€, The 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), IEEE pp:260-265.
Fisnik Dalipi and Sule Yildirim Yayilgan, “Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challengesâ€, 4th International Conference on Future Internet of Things and Cloud Workshops2016, pp:63-68.
Elisa Bertino, “Data Privacy for IoT Systems Concepts, Approaches, and Research Directionsâ€, IEEE International Conference on Big Data (Big Data) 2016, pp:3645-3647.
Prasoon Raghav, Rahul Kumar and Rajat Parashar, “Securing Data in Cloud Using AES Algorithmâ€, International Journal of Engineering Science and Computing,2016, ISSN 2321 3361,pp: 3672-3675.
Priyesh Parikh, Satish N arkhede, “High performance implementation of Mixing of Column and inv Mixing of column for AES on FPGAâ€, International Conference on Computation of Power, Energy Information and Communication, IEEE2016, pp: 174-179.
S. Mary Sujatha and Y. Usha Devi, “Design and Implementation of IoT Testbed with Three Factor Authenticationâ€, IEEE 2015, pp: 1-5.
Reinhard Behrens and Ali Ahmed “Internet of Things: An End-to-End Security Layerâ€, IEEE 2017, pp: 146-149.
Md Husamuddin and Mohammed Qayyum, “Internet of Things A Study on Security and Privacy Threatsâ€, IEEE 2017, pp: 1-5.